Algorithm and implementation of the network data filter with concealed from the outside observer rules

Download article in PDF format

Authors: Sergeev D. V., Hadi R. A.

Annotation: It is shown the application of network information filtering algorithm taking into account the presence of one or more outside observers interested in the showdown of the algorithm. It is constructed a model of threats and an example implementation.

Keywords: filtration, outside observer, network information, the hidden record

Editorial office address

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 701-582

  journal@tusur.ru

 

Viktor N. Maslennikov

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 51-21-21 / 51-43-02

  vnmas@tusur.ru

Subscription for updates